Novell iPrint Client < 5.42 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 5647

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

Versions of Novell iPrint Client earlier than 5.42 are potentially affected by multiple vulnerabilities :

- Due to a flaw in the nipplib.dll module, it may be possible for a remote attacker to delete arbitrary files from the remote system via the 'CleanUploadFiles' method provided by an ActiveX control. (TPTI-10-05)

- By passing a specially crafted value to the 'debug' parameter in the ActiveX control ienipp.ocx, it may be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in arbitrary code execution within the context of the user running the browser. (TPTI-10-06)

- Due to improper validation of plugin parameters, it may be possible for an attacker to trigger a buffer overflow condition resulting in arbitrary code execution within the context of the user running the browser. (ZDI-10-139)

Due to improper validation of plugin parameters it may be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in arbitrary code execution within the context of the user running the browser. (ZDI-10-140)

Solution

Upgrade to Novell iPrint Client 5.42 or later.

See Also

http://dvlabs.tippingpoint.com/advisory/TPTI-10-06

http://dvlabs.tippingpoint.com/advisory/TPTI-10-05

http://www.zerodayinitiative.com/advisories/ZDI-10-139

http://www.zerodayinitiative.com/advisories/ZDI-10-140

http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0066.html

http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0067.html

http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0070.html

http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0071.html

http://download.novell.com/Download?buildid=ftwZBxEFjIg~

Plugin Details

Severity: Medium

ID: 5647

Family: Web Clients

Published: 8/25/2010

Updated: 3/6/2019

Nessus ID: 48364

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:novell:iprint

Patch Publication Date: 7/23/2010

Vulnerability Publication Date: 7/23/2010

Exploitable With

Metasploit (Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow)

Reference Information

CVE: CVE-2010-3106, CVE-2010-3107, CVE-2010-3108, CVE-2010-3109

BID: 42100